This is a list of 10 more refined Java coding practices than Josh Bloch's valid Java rules. Compared to the list of Josh Bloch, which is easier to learn and focus on daily situations, this list will include uncommon situations involving API/SPI design and may have a great impact.
I have encountered this in writing and maintaining jOOQ (SQL for internal DSL Modeli
I often encounter java coding problems at work. Due to lack of research, I cannot give a definite answer. I checked some information online this weekend and made a summary here.
Question 1: What encoding should I use to read files in java?
Java can read files in two types: byte and character. Byte reading uses InputStr
characters to the database, JDBC first converts the data in the Unicode encoding format inside the program to the ISO-8859-1 format, and then passes it to the database, when the database saves the data, it is saved by ISO-8859-1 by default, so this is why the Chinese data we often read in the database is garbled.
3. Several principles that must be clarified when analyzing common Java Chinese problems
First of all, after detailed analysis above, w
Often encountered in the work of Java coding problems, due to lack of research, always can not give the exact answer, this weekend on the Internet to check some information, here to do some summary.Question one: What encoding should I use to read a file in Java?The way Java reads files can be divided into two categorie
Java coding comprehension keywords: Java coding, Unicode, getbytes () come from my notes: youdao note-Java coding understanding the coding involved in various programs is nothing more t
100 times the latter, but it does use the same number of digits in the binary. Can do better, the method is variable length coding, the guiding principle is high frequency with a shorter number of digits encoded, low frequency with a longer digit code. Huffman coding algorithm is to deal with such problems.
Huffman coded Java implementation
The main data struc
1. Overview
This article mainly includes the following aspects: Basic coding knowledge, Java, system software, URL, tool software, etc.
In the following description, the word "Chinese" is used as an example. We can see that its gb2312 encoding is"D6d0 cec4", Unicode encoding is"4e2d 6587", UTF Encoding is"E4b8ad e69687". Note that the two words do not have iso8859-1 encoding, but they can be represented by
1. Overview
This article mainly includes the following aspects: Basic coding knowledge, Java, system software, URL, tool software, etc.
In the following description, we will take the word "Chinese" as an example. We can see that its gb2312 encoding is "d6d0 cec4" and Its unicode encoding is "4e2d 6587 ", the UTF code is "e4b8ad e69687 ". Note that the two words do not have iso8859-1 encoding, but they can b
1.1 objectives and requirements
Why coding standards?
Coding standards are especially important for programmers for the following reasons:
-80% of the cost for a software life cycle is maintenance.
-Almost no software is maintained by the original developer throughout its lifecycle.
-Coding specifications can improve the readability of software and allow programm
Coding specifications are important for developers, for several reasons:1. In the life cycle of a software, 80% of the cost is maintained2. Virtually no software, throughout its lifecycle, is maintained by the initial developer3. The coding specification can improve the readability of the software, allowing programmers to understand the new code as quickly and thoroughly as possible.4. If you publish the so
has been trying to figure out the coding problem in Java, but also read some articles on the internet, but still foggy. It was not until recently that I saw Fanglixun's web course that I understood a little.Keep a record of your understanding and see if you can be clear about it.
The first question: I define a string in Java code, what is it encoded?
. I have searched for this option Java official documentation. But I can ' t find it.How does the open a jar file on a Mac?You can indeed launch a jar file from the command line, with the following command:Java-jar Yourfile.jarAs well as the default app for this can assign "Jar Launcher" as the. Double-click a jar file, as follows (I don t believe you need the developer tools installed for this):Click once on the. jar file in the Finder and then from
Please contact me if you have any questions :)
Coding FAQ (PL/SQL and Java)1. the PL/SQL data type is incorrect. For example, aac001 is of the varchar2 type, but it is not included in ''. Although the program can be queried, it poses a hidden risk for future performance problems.Select aac002 from ac01 where aac001 = 123456;Select aac002 from ac01 where aac001 = '000000 ';2. The code is too long.No matter i
Chinese characters use three bytes.
Note that although UTF is used to use less space, it is only relative to Unicode encoding, and using GB2312/GBK is undoubtedly the most economical if it is already known to be Chinese. On the other hand, it is worth noting that although the UTF encoding uses 3 bytes for Chinese characters, even for Chinese-language web pages, UTF encoding is more economical than Unicode encoding, because the Web page contains a lot of English characters.
Second,
In this article, we discuss 13 different static exposure techniques. For each type of exposure, we explain the impact of not dealing with these security issues. We also recommend some rules for you to develop robust and secure Java applications that are not threatened by these static security exposures. When appropriate, we provide code samples (both exposed code and exposed code ).
Techniques for dealing with High severity exposuresFollow the follow
Java is Google's coding style guide... this is awesome. We will provide you with a pdf version of the first version. If you have money, please buy the second version of the genuine version.
There are also several Java-related coding styles that actually come from Google for reference:The encoding style recommended by
multi-threading best practice, but it's double edge sword at same time. Lock interface is powerful but every power comes with responsibility. Different locks for Read and write operation allows to build scalable data structures like Concurrenthashmap, but it also Require lot of care during coding. Unlike synchronized keyword, thread doesn ' t release lock automatically. You need to call unlock () method to release a lock and the best practice are to
Source: http://java.sun.com/docs/codeconv/html/CodeConvTOC.doc.html,Http://morningspace.51.net/,moyingzz@etang.com.
1 Introduction (Introduction)1.1 Why coding standards (Why Have Code Conventions)Coding standards are especially important for programmers for the following reasons:-80% of the cost for a software life cycle is maintenance.-Almost no software is maintained by the original developer throughout
Coding | Problems Java language default encoding is Unicode, and we Chinese commonly used files and databases are based on GB2312 or BIG5 encoding, how to properly select the encoding method and correctly handle the Chinese character encoding? This article will start with encoding common sense, combine Java programming example, analyze above two questions and pro
Coding problems in Java
First, the encoding format:
1.ASCII a total of 128 2.iso-8859-1 a total of 256, covering most of the Western European language characters 3.gb2312 contains 682 symbols, 6,763 Chinese characters
4.GBK compatible GB3212, including 21,003 Chinese characters 5.gb13030 compatible GB2312 "Chinese character coded character set for information interchange" national standard
6.utf-16 Unicode
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.